Automation.com | Cybersecurityhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/rss
Daily news headlines for industrial automation, process control and instrumentation professionals from Automation.com. Includes product news, company and organizational news, and application news.en-usSun, 18 Mar 2018 12:18:47 -0500Sun, 18 Mar 2018 12:18:47 -0500SMC 3.34 http://www.fivetechnology.comIIC Endpoint Security Best Practices http://www.automation.com/pdf_articles/IIC/Endpoint_Security_Best_Practices_Final_Mar_2018.pdf
http://www.automation.com/pdf_articles/IIC/Endpoint_Security_Best_Practices_Final_Mar_2018.pdf This white paper from the Industrial Internet Consortium recommends best practices for endpoint security in industrial applications under the broader scope of industrial internet security. The basis for this document is the detailed analysis in the various industrial guidance and compliance frameworks that already exist Wed, 14 Mar 2018 11:55:59 -0500Siemens welcomes AES Corporation, Atos and Enel to Charter of Trust cybersecurity initiativehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/siemens-welcomes-aes-corporation-atos-and-enel-to-charter-of-trust-cybersecurity-initiative
http://www.automation.com/automation-news/industry/siemens-welcomes-aes-corporation-atos-and-enel-to-charter-of-trust-cybersecurity-initiativeSiemens, and the eight founding Charter of Trust members, welcomed The AES Corporation, Atos and Enel to its global cybersecurity initiative at the 2018 CERAWeek conference in Houston, TX. Fri, 09 Mar 2018 11:19:07 -0600Nozomi Networks partners with Leonardo to enhance ICS cybersecurityhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/nozomi-networks-partners-with-leonardo-to-enhance-ics-cybersecurity
http://www.automation.com/automation-news/industry/nozomi-networks-partners-with-leonardo-to-enhance-ics-cybersecurityNozomi Networks’ end-to-end platform is designed for ICS cybersecurity. Capabilities include real-time ICS monitoring, industrial network visualization, hybrid ICS threat and anomaly detection, asset inventory and vulnerability assessment, all delivered through a single solution.Thu, 08 Mar 2018 11:35:19 -0600Siemens partners with Secure-NOK to integrate cybersecurity solutions into Ruggedcom product portfoliohttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/siemens-partners-with-secure-nok-to-integrate-cybersecurity-solutions-into-ruggedcom-product-portfolio
http://www.automation.com/automation-news/industry/siemens-partners-with-secure-nok-to-integrate-cybersecurity-solutions-into-ruggedcom-product-portfolioThe combination of Siemens industrial experience and Secure-NOK’s technology is intended to offer a flexible solution for infrastructure in industries such as Power Utilities, Oil &Gas installations, Transportation Systems and others with a growing need to protect against cyber threats.Wed, 07 Mar 2018 11:38:47 -0600Wibu-Systems announces Intel Software Guard Extensions for the CodeMeter platformhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/wibu-systems-announces-intel-software-guard-extensions-for-the-codemeter-platform
http://www.automation.com/products/wibu-systems-announces-intel-software-guard-extensions-for-the-codemeter-platformCodeMeter SmartBind is a solution that creates a digital fingerprint of the target device; its tolerance mechanism ensures that the cryptographic keys stored in the secure license file (CmActLicense) remain valid even when the hardware components of the device are replaced within the tolerance level selected. CodeMeter Binding Extension allows for a custom implementation of the binding mechanism.Tue, 06 Mar 2018 11:40:27 -0600WoMaster releases series of IIoT Cyber Security training videos http://www.automation.com/portals/manufacturing-operations-management/cyber-security/womaster-releases-series-of-iiot-cyber-security-training-videos
http://www.automation.com/library/resources/womaster-releases-series-of-iiot-cyber-security-training-videosWoMaster held Cyber Security training for its partners to demonstrate how they can provide a complete protection of IIoT network according to ISASecure - IEC 62443-4-2 from currently existing threatsMon, 05 Mar 2018 10:53:23 -0600Cybersecurity industry leaders announce launch of Industrial Control System (ICS) Villagehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/cybersecurity-industry-leaders-announce-launch-of-industrial-control-system-ics-village
http://www.automation.com/automation-news/industry/cybersecurity-industry-leaders-announce-launch-of-industrial-control-system-ics-villageThe ICS Village is a traveling interactive experience that showcases ICS technologies and highlights the security controls that enable them to power the secure operations of chemical processing plants, pulp and paper manufacturing facilities, power generation systems, oil and gas processing, telecommunications networks and other elements of critical infrastructure.Fri, 02 Mar 2018 11:59:29 -0600Radiflow partners with Wireless Data Systems to enhance cybersecurity in critical infrastructurehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/radiflow-partners-with-wireless-data-systems-to-enhance-cybersecurity-in-critical-infrastructure
http://www.automation.com/automation-news/industry/radiflow-partners-with-wireless-data-systems-to-enhance-cybersecurity-in-critical-infrastructureAs part of the cooperation between the two companies, Wireless Data Systems will integrate and support Radiflow’s industrial intrusion detection and security gateway products as part of the cybersecurity solutions and system integration services that Wireless Data Systems providesTue, 27 Feb 2018 11:07:38 -0600Trustonic introduces IoT Device Security & Authenticity solutionhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/trustonic-introduces-iot-device-security-authenticity-solution
http://www.automation.com/products/trustonic-introduces-iot-device-security-authenticity-solutionTrustonic’s modular IoT security solution delivers a range of features. These include device attestation, protection from overproduction, cloning and tampering, supply chain integrity from start to in-field operation and autonomous cloud enrollment.Tue, 27 Feb 2018 11:07:28 -0600Overcoming Cybersecurity Challenges in Industrial Control Systemshttp://www.automation.com/pdf_articles/veracity/VeracityICSWhitePaper.pdf
http://www.automation.com/pdf_articles/veracity/VeracityICSWhitePaper.pdf By Veracity
Holistic challenges such as ICS cybersecurity can be overwhelming. Security solutions often create more challenging system-wide issues. Attacking comprehensive problems with individual statements helps us to focus on solving analysis and planning issues step by step. This paper identifies two individual problem statements that address the comprehensive issue of ICS security.Fri, 23 Feb 2018 11:51:56 -0600Proactive Security Concepts Instead of Reactive Defense: Safety and security in industrial plants needs rethinkinghttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/proactive-security-concepts-instead-of-reactive-defense-safety-and-security-in-industrial-plants-needs-rethinking
http://www.automation.com/automation-news/article/proactive-security-concepts-instead-of-reactive-defense-safety-and-security-in-industrial-plants-needs-rethinkingBy Dr. Alexander Horch, HIMA
This article explains why the process industry needs to switch from passive to active defense mode for cybersecurity and what it must do to ensure plant security in the digital era.Fri, 23 Feb 2018 11:34:50 -0600HIMA talks functional safety concepts at ARC Industry Forumhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/hima-talks-functional-safety-concepts-at-arc-industry-forum-1
http://www.automation.com/automation-news/industry/hima-talks-functional-safety-concepts-at-arc-industry-forum-1At the ARC Industry Forum which was held in Orlando, Florida, from February 12 – 15, HIMA presented its comprehensive functional safety concept which offers security by expanding the scope from the safety instrumented system to its security-relevant environment.Thu, 22 Feb 2018 11:13:03 -0600Rohde & Schwarz announces R&SPACE 2 deep packet inspection (DPI) software with Stratum protocol classificationhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/rohde-schwarz-announces-rspace-2-deep-packet-inspection-dpi-software-with-stratum-protocol-classification
http://www.automation.com/products/rohde-schwarz-announces-rspace-2-deep-packet-inspection-dpi-software-with-stratum-protocol-classificationWith this visibility, network security solutions are able to detect symptoms of drive-by crypto and stealth mining attacks and can implement countermeasures such as application control policies or security algorithms based on anomaly detection.Tue, 20 Feb 2018 12:14:57 -0600Breaking Down Barriers, Bridging the Gap: Fixing the digital skills shortagehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/breaking-down-barriers-bridging-the-gap-fixing-the-digital-skills-shortage
http://www.automation.com/automation-news/article/breaking-down-barriers-bridging-the-gap-fixing-the-digital-skills-shortageBy Graham Smith, Curo Talent
Something that isn’t talked about nearly enough is the fact that the IT sector, which, by nature, should enable remote working, hasn’t moved away from the inflexible office environment. This article explains how remote working could close the IT skills gap.Tue, 20 Feb 2018 11:51:56 -0600Wibu-Systems announces release of CodeMeter Embedded 2.1http://www.automation.com/portals/manufacturing-operations-management/cyber-security/wibu-systems-announces-release-of-codemeter-embedded-21
http://www.automation.com/products/wibu-systems-announces-release-of-codemeter-embedded-21With the availability of the version 2.1, embedded software developers can now select among a list of preset SDKs, each consisting of one static library for every combination of supported operating system and architecture. Fri, 16 Feb 2018 14:28:47 -0600Eaton announces cybersecurity collaboration with UL http://www.automation.com/portals/manufacturing-operations-management/cyber-security/eaton-announces-cybersecurity-collaboration-with-ul
http://www.automation.com/automation-news/industry/eaton-announces-cybersecurity-collaboration-with-ulThe collaboration is helping to establish measurable cybersecurity criteria for network-connected power management products and systems.Fri, 16 Feb 2018 11:11:34 -0600Siemens and eight partners sign joint charter for greater cybersecurityhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/siemens-and-eight-partners-sign-joint-charter-for-greater-cybersecurity
http://www.automation.com/automation-news/industry/siemens-and-eight-partners-sign-joint-charter-for-greater-cybersecurityInitiated by Siemens, the Charter of Trust calls for binding rules and standards to build trust in cybersecurity and further advance digitalization.Fri, 16 Feb 2018 10:51:34 -0600Claroty releases Continuous Threat Detection (Version 2.1) and Security Posture Assessment producthttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/claroty-releases-continuous-threat-detection-version-21-and-security-posture-assessment-product
http://www.automation.com/products/claroty-releases-continuous-threat-detection-version-21-and-security-posture-assessment-productThis release incorporates real-time vulnerability monitoring and network hygiene insights with attack vector analysis to help industrial asset owners protect industrial systems from rapidly growing threatsWed, 14 Feb 2018 11:55:36 -0600Dragos announces release of Dragos Platform 1.2http://www.automation.com/portals/manufacturing-operations-management/cyber-security/dragos-announces-release-of-dragos-platform-12
http://www.automation.com/products/dragos-announces-release-of-dragos-platform-12Dragos’ industrial cybersecurity platform goes beyond analyzing network traffic to also collecting, storing, and correlating logs and data from host systems, logic controllers, and data historians. Wed, 14 Feb 2018 11:16:02 -0600Honeywell announces opening of cybersecurity center of excellence in Dubaihttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/honeywell-announces-opening-of-cybersecurity-center-of-excellence-in-dubai
http://www.automation.com/automation-news/industry/honeywell-announces-opening-of-cybersecurity-center-of-excellence-in-dubaiThis investment comes in support of regional government initiatives such as the Dubai Cyber Security Strategy, aiming to strengthen cyber security defenses amidst growing digital transformation across industries. The center will support a developing Middle East cyber security market. Tue, 13 Feb 2018 10:51:20 -0600Stratus Technologies introduces Stratus ztC Edge self-protecting computing platformhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/stratus-technologies-introduces-stratus-ztc-edge-self-protecting-computing-platform
http://www.automation.com/products/stratus-technologies-introduces-stratus-ztc-edge-self-protecting-computing-platformztC Edge is a zero-touch, fully virtualized and self-protecting computing platform, specifically designed for industrial edge environments. Mon, 12 Feb 2018 11:34:00 -0600Bedrock announces availability of Cybershield 3.0http://www.automation.com/portals/manufacturing-operations-management/cyber-security/bedrock-announces-availability-of-cybershield-30
http://www.automation.com/products/bedrock-announces-availability-of-cybershield-30Cybershield 3.0 is a firmware upgrade with advancements designed to help end users and developers to build control applications that are both open and secure. Mon, 12 Feb 2018 10:41:18 -0600SCALABLE Network Technologies announces Network Defense Trainer (NDT) version 2.0http://www.automation.com/portals/manufacturing-operations-management/cyber-security/scalable-network-technologies-announces-network-defense-trainer-ndt-version-20
http://www.automation.com/products/scalable-network-technologies-announces-network-defense-trainer-ndt-version-20NDT integrates real and simulated cyber-attacks, wired and wireless virtual networks, live and virtual equipment and applications, and traditional kinetic warfare training simulators into a full, instrumented, synthetic cyber warfare training environment. Wed, 07 Feb 2018 13:04:33 -06002018 HANNOVER MESSEhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/2018-hannover-messe
http://www.automation.com/calendar-of-events/2018-hannover-messeFive trade shows, one platform. From April 23-27, 2018, at the world’s largest industrial trade fair, you will find the full range of technical innovations throughout the whole value chain – from automation to supplier solutions.Wed, 07 Feb 2018 12:54:31 -0600Cyber Security - Getting in Focus with Nozomi Networkshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/cyber-security-getting-in-focus-with-nozomi-networks
http://www.automation.com/automation-news/article/cyber-security-getting-in-focus-with-nozomi-networksBy Bill Lydon, Editor, Automation.com
In the race for industrial profits, it’s not uncommon for organizations to run legacy equipment as long as they can, and avoid costly replacements and rewirings. While this can be a viable strategy in many areas, when it comes to industrial control network cyber security, it can be a deadly vulnerability for today’s organizationsTue, 06 Feb 2018 11:24:32 -0600A New Deal for Buildingshttp://www.automation.com/pdf_articles/cimetrics/CABA-IBC-White-Paper-New-Deal-Final.pdf
http://www.automation.com/pdf_articles/cimetrics/CABA-IBC-White-Paper-New-Deal-Final.pdf This whitepaper discusses ways to facilitate the adoption of information technologies in order to enable a more productive indoor environment. Fri, 02 Feb 2018 11:41:46 -0600AAEON introduces FWS-2360 desktop network security appliancehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/aaeon-introduces-fws-2360-desktop-network-security-appliance
http://www.automation.com/products/aaeon-introduces-fws-2360-desktop-network-security-applianceIn addition to its pair of fiber/copper SFP GbE ports are four conventional GbE ports and two Mini-card slots to accommodate WiFi and 4G LTE expansion. The system’s inbuilt bypass function also ensures that network traffic will continue to flow in the event of software complications or loss of power. Thu, 01 Feb 2018 11:16:09 -0600Nuclear Engineering for Safety, Control and Security Conference http://www.automation.com/portals/manufacturing-operations-management/cyber-security/nuclear-engineering-for-safety-control-and-security-conference
http://www.automation.com/calendar-of-events/nuclear-engineering-for-safety-control-and-security-conferenceThe Institution of Engineering and Technology (IET)—a member organization of the Automation Federation—will hold its sixth Nuclear Engineering for Safety, Control and Security Conference 14-15 March 2018 at the Manchester Conference Centre in Manchester, England.
Wed, 31 Jan 2018 15:58:02 -0600Bill’s Top 10 Automation & Control Trends for 2018 - A Year of Technology Driven Changehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/bills-top-10-automation-control-trends-for-2018-a-year-of-technology-driven-change
http://www.automation.com/automation-news/article/bills-top-10-automation-control-trends-for-2018-a-year-of-technology-driven-changeBy Bill Lydon, Editor, Automation.com
The digitalization of manufacturing is starting to come into focus in 2018. After another busy year talking to users, suppliers and industry consultants, and attending over 20 industry conferences and related events, I have another year’s worth of informed insights to share on the latest trends that will shape automation in 2018. Tue, 30 Jan 2018 11:38:20 -0600Schneider Electric announces partnership with Cylancehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/schneider-electric-announces-partnership-with-cylance
http://www.automation.com/automation-news/industry/schneider-electric-announces-partnership-with-cylanceSchneider Electric Software will work closely with Cylance to enable heightened levels of security for customers leveraging the Industrial Software Platform for Engineering, Planning and Operations, Asset Performance and Monitoring and Control across their industrial and infrastructure operations.Tue, 30 Jan 2018 10:43:55 -0600Radiflow announces cybersecurity technology integration with ResilientGridhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/radiflow-announces-cybersecurity-technology-integration-with-resilientgrid
http://www.automation.com/automation-news/industry/radiflow-announces-cybersecurity-technology-integration-with-resilientgridResilientGrid has integrated the industrial cybersecurity capabilities of Radiflow’s iSID system into its ResilientGrid Map solution. iSID is an industrial intrusion detection system designed specifically for the needs of operators of critical infrastructure.Wed, 24 Jan 2018 15:08:42 -0600Why You Must Incorporate Safety and Cybersecurity Standards Into Your Automation Designhttps://automation.isa.org/2018/01/industrial-automation-prepare-inevitable-cybersecurity-incident-incorporate-standards/
https://automation.isa.org/2018/01/industrial-automation-prepare-inevitable-cybersecurity-incident-incorporate-standards/By Marty Edwards, Automation Federation
Attackers have now breached the next bastion of the safety envelope of a plant environment and influenced the operation of a safety system. There are simple steps that must be taken now to make your automation systems more resilient to the inevitable cyberattack.Fri, 19 Jan 2018 11:33:25 -0600Bedrock Automation releases ICS Cyber Security Best Practices white paperhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/bedrock-automation-releases-ics-cyber-security-best-practices-white-paper
http://www.automation.com/library/white-papers/bedrock-automation-releases-ics-cyber-security-best-practices-white-paperThe 20-page document, Securing Industrial Control Systems - Best Practices, covers the threat landscape and presents a holistic approach to defending it, including assessing risk, physical security, network security, workstation and server security, as well as the fundamentals of OSA.Thu, 18 Jan 2018 11:48:23 -0600PAS Global announces PAS Cyber Integrity 6.0http://www.automation.com/portals/manufacturing-operations-management/cyber-security/pas-global-announces-pas-cyber-integrity-60
http://www.automation.com/products/pas-global-announces-pas-cyber-integrity-60PAS Cyber Integrity 6.0 now includes continuous vulnerability management providing visibility into vulnerability risk within industrial process control networksTue, 16 Jan 2018 11:15:25 -0600Safe and Sound: 7 Strategies on How Young Startups Can Protect Their Digital Assetshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/safe-and-sound-7-strategies-on-how-young-startups-can-protect-their-digital-assets
http://www.automation.com/automation-news/article/safe-and-sound-7-strategies-on-how-young-startups-can-protect-their-digital-assetsBy Rick Delgado, Freelance Automation Commentator
This guide seeks to educate a startups management on inexpensive methods of protecting their digitals assets and online business information.Fri, 12 Jan 2018 11:22:34 -0600CyberX releases CyberX ICS Threat Monitoring App for QRadar http://www.automation.com/portals/manufacturing-operations-management/cyber-security/cyberx-releases-cyberx-ics-threat-monitoring-app-for-qradar
http://www.automation.com/products/cyberx-releases-cyberx-ics-threat-monitoring-app-for-qradarIntegrating CyberX’s purpose-built OT security platform with IBM QRadar is designed to enable organizations to respond more quickly, allowing CISOs to strengthen OT security while building upon the investments they’ve already made in people, workflows, and technology for the corporate SOC.Wed, 10 Jan 2018 16:06:06 -0600Nozomi Networks announces $15 Million investment to expand in ICS cybersecurity markethttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/nozomi-networks-announces-15-million-investment-to-expand-in-ics-cybersecurity-market
http://www.automation.com/automation-news/industry/nozomi-networks-announces-15-million-investment-to-expand-in-ics-cybersecurity-marketThe Invenergy Future Fund led the round with participation from THI Investments and all existing investors, GGV Capital, Lux Capital and Planven Investments SA. This latest round brings Nozomi Networks’ total funding to date to $23.8 million.Wed, 10 Jan 2018 11:20:00 -0600Kaspersky Report: Targeted attacks against ICS sector on the risehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/kaspersky-report-targeted-attacks-against-ics-sector-on-the-rise
http://www.automation.com/automation-news/industry/kaspersky-report-targeted-attacks-against-ics-sector-on-the-riseAccording to the Kaspersky Lab, IT Security Risks Survey, every fourth industrial company of over 900 surveyed faced a variety of cyberattacks in 2017. Of the evolving types of threats used by cybercriminals, one of the fastest growing types aimed at industrial organizations is targeted attacks.Fri, 05 Jan 2018 11:18:16 -0600In the Age of Digital Industry, What’s Next for Intelligent Machines?http://www.automation.com/portals/manufacturing-operations-management/cyber-security/in-the-age-of-digital-industry-whats-next-for-intelligent-machines
http://www.automation.com/automation-news/article/in-the-age-of-digital-industry-whats-next-for-intelligent-machinesBy Eddie Amos, GE Digital
What does the future hold for industrial organizations like those in manufacturing? Like the paved highway systems for cars to drive on, the increased connectivity of industrial assets has been foundational for the next wave of technological advancements.Thu, 04 Jan 2018 16:30:29 -0600Tosibox introduces TOSIBOX Lock 500 connectivity devicehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/tosibox-introduces-tosibox-lock-500-connectivity-device
http://www.automation.com/products/tosibox-introduces-tosibox-lock-500-connectivity-deviceThe Lock 500 is designed for demanding industrial environments and opens new opportunities in security and office networking sectors.Tue, 02 Jan 2018 10:40:15 -0600Leidos partners with Nozomi Networks to enhance Industrial Defender Automation Systems Manager (ASM) solutionhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/leidos-partners-with-nozomi-networks-to-enhance-industrial-defender-automation-systems-manager-asm-solution
http://www.automation.com/products/leidos-partners-with-nozomi-networks-to-enhance-industrial-defender-automation-systems-manager-asm-solutionThe integrated Leidos and Nozomi Networks’ solution adds ICS intrusion detection and passive asset discovery and monitoring to Leidos’ Industrial Defender ASM. This strengthens the ASM’s ability to identify operational technology network assets and adds cutting-edge detection capabilities.Tue, 02 Jan 2018 10:31:28 -0600Bedrock announces addition of Intrinsic Anomaly Detection to Bedrock OSA firmwarehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/bedrock-announces-addition-of-intrinsic-anomaly-detection-to-bedrock-osa-firmware
http://www.automation.com/products/bedrock-announces-addition-of-intrinsic-anomaly-detection-to-bedrock-osa-firmwareBedrock OSA AD will be available as standard integrated functionality that continuously monitors the controller’s network and system time to detect intrusions and anomalous behavior.Thu, 21 Dec 2017 11:51:53 -0600FieldComm Group announces version 1.1 of the FDI Technical Specifications and version 1.2.1 of the FDI Development Toolshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/fieldcomm-group-announces-version-11-of-the-fdi-technical-specifications-and-version-121-of-the-fdi-development-tools
http://www.automation.com/library/resources/fieldcomm-group-announces-version-11-of-the-fdi-technical-specifications-and-version-121-of-the-fdi-development-toolsThe latest version provides additional cyber security measures to FDI by enabling time stamping on FDI Device Package signatures and sandbox environments for UIPs to run in.Mon, 18 Dec 2017 13:54:45 -0600Secure Configuration and Operation of OPC UAhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/secure-configuration-and-operation-of-opc-ua
http://www.automation.com/library/white-papers/secure-configuration-and-operation-of-opc-uaThe OPC Foundation published a set of practical guidelines for the secure configuration and use of OPC UA in industry. This brochure helps readers quickly understand what OPC UA security has to offer and how to best use it. Mon, 18 Dec 2017 13:34:07 -06002018 ARC Industry Forum to focus on benefits and challenges of digital transformationhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/2018-arc-industry-forum-to-focus-on-benefits-and-challenges-of-digital-transformation
http://www.automation.com/automation-news/event/2018-arc-industry-forum-to-focus-on-benefits-and-challenges-of-digital-transformationThe 22nd annual ARC Industry Forum in Orlando, Florida, Feb. 12-15, 2018, will focus on the new digitally-enabled technologies, approaches, and business processes that are disrupting the way industry, infrastructure, and municipalities around the world operate and serve their respective customers.Fri, 15 Dec 2017 11:40:24 -0600Claroty partners with Leidos to enhance passive monitoring for ICS networkshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/claroty-partners-with-leidos-to-enhance-passive-monitoring-for-ics-networks
http://www.automation.com/automation-news/industry/claroty-partners-with-leidos-to-enhance-passive-monitoring-for-ics-networksLeidos customers will gain integration with the Claroty Platform for continuous threat monitoring, detection and response. The offering will be available through resale by Leidos to both current and future Leidos Industrial Defender ASM customersThu, 14 Dec 2017 10:05:28 -0600CyberX announces tech integration with CyberArk to enhance remote access securityhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/cyberx-announces-tech-integration-with-cyberark-to-enhance-remote-access-security
http://www.automation.com/automation-news/industry/cyberx-announces-tech-integration-with-cyberark-to-enhance-remote-access-securityThe CyberX platform is designed to deliver continuous ICS threat monitoring and asset discovery, ICS threat intelligence, and non-invasive risk and vulnerability assessments.Thu, 14 Dec 2017 09:58:32 -0600What Lies Beneath – Avoiding the Unseen Dangers of OT Vulnerabilitieshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/what-lies-beneath-avoiding-the-unseen-dangers-of-ot-vulnerabilities
http://www.automation.com/automation-news/article/what-lies-beneath-avoiding-the-unseen-dangers-of-ot-vulnerabilitiesBy Scott Hollis, PAS Global
Process control networks (PCNs) in critical infrastructure sites − refineries, chemical plants, and manufacturing facilities − all have potential danger swimming just below the surface in the form of undiscovered vulnerabilities. Mon, 11 Dec 2017 10:56:08 -0600Renishaw and Identify3D partner to secure digital manufacturing processhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/renishaw-and-identify3d-partner-to-secure-digital-manufacturing-process
http://www.automation.com/automation-news/industry/renishaw-and-identify3d-partner-to-secure-digital-manufacturing-process By choosing to secure all digital data in the engineering phase, the technology enables users of Renishaw systems to protect their digital intellectual property (IP), enforce production rules and provide traceability in the digital supply chain Thu, 07 Dec 2017 11:14:23 -0600Honeywell Survey: Low adoption of cybersecurity measures still plagues industryhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/honeywell-survey-low-adoption-of-cybersecurity-measures-still-plagues-industry
http://www.automation.com/library/resources/honeywell-survey-low-adoption-of-cybersecurity-measures-still-plagues-industryThe survey polled 130 strategic decision makers from industrial companies about their approach to the Industrial Internet of Things (IIoT), and their use of industrial cyber security technologies and practices. Wed, 06 Dec 2017 11:24:05 -0600Two Schneider Electric facilities earn ISASecure Level Two Security Development Lifecycle Assurance certificationhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/two-schneider-electric-facilities-earn-isasecure-level-two-security-development-lifecycle-assurance-certification
http://www.automation.com/automation-news/industry/two-schneider-electric-facilities-earn-isasecure-level-two-security-development-lifecycle-assurance-certificationSchneider Electric's Calgary, Alberta and Lake Forest, California process automation product development centers have been certified by exida, a globally recognized ISO 17065 certification body.Tue, 05 Dec 2017 11:43:32 -06002017 Ignition Conference – Expanding Ecosystem & Edge IoT Drive Enthusiasmhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/2017-ignition-conference-expanding-ecosystem-edge-iot-drive-enthusiasm
http://www.automation.com/automation-news/article/2017-ignition-conference-expanding-ecosystem-edge-iot-drive-enthusiasmBy Bill Lydon, Editor, Automation.com
The convergence of IT and OT, to create more effective operations throughout the company, was evident throughout the conference presentations and discussions, and this reflects many of the recent trends in the manufacturing industry.Mon, 04 Dec 2017 11:49:33 -060022nd Annual ARC Industry Forumhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/22nd-annual-arc-industry-forum
http://www.automation.com/calendar-of-events/22nd-annual-arc-industry-forumCome to the 22nd Annual ARC Industry Forum in Orlando, Florida to learn more about how digitizing factories, cities, and infrastructure will benefit technology end users and suppliers alike. Discover what your peers are doing today and what steps they are taking in their respective journeys.Tue, 28 Nov 2017 12:26:26 -0600AutomationDirect introduces STRIDE SiteLink remote access cloud enablerhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/automationdirect-introduces-stride-sitelink-remote-access-cloud-enabler
http://www.automation.com/products/automationdirect-introduces-stride-sitelink-remote-access-cloud-enablerThe SiteLink platform consists of three types of VPN routers and two antenna sets (Wifi and cellular). 5GB monthly data bandwidth is included free and subscription options include additional bandwidth (up to 50GB) and cloud data logging. Wed, 22 Nov 2017 11:50:54 -0600Honeywell Working to Strengthen Cyber Security Safeguardshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/honeywell-working-to-strengthen-cyber-security-safeguards
http://www.automation.com/automation-news/article/honeywell-working-to-strengthen-cyber-security-safeguardsBy Bill Lydon, Editor, Automation.com
Cyber security remains a prominent concern for many organizations as we continue to move towards a connected industrial future. In this vein, Honeywell recently made a big commitment to Industrial Cyber Security at the 2017 Honeywell Users Group Americas,Tue, 21 Nov 2017 13:29:36 -0600The Future of Process System Architectures – Insights from 2017 Foxboro User Grouphttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/the-future-of-process-system-architectures-insights-from-2017-foxboro-user-group
http://www.automation.com/automation-news/article/the-future-of-process-system-architectures-insights-from-2017-foxboro-user-groupBy Bill Lydon, Editor, Automation.com
A common topic of debate revolves around how process system architectures will be shaped in the future. One architectural vision would enable a shift of focus from process efficiency control to business performance control, with increasing levels of monitoring and control.Mon, 13 Nov 2017 11:48:57 -0600Lanner announces release of FX-3230 network appliancehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/lanner-announces-release-of-fx-3230-network-appliance
http://www.automation.com/products/lanner-announces-release-of-fx-3230-network-applianceThe FX-3230 can be configured with up to 384GB of DDR4 2666 MHz REG DIMM system memory. For storage, it is equipped with 4x 3.5” swappable HDD baysMon, 13 Nov 2017 11:38:53 -0600Wibu-Systems joins Open Source Automation Development Lab (OSADL) cooperativehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/wibu-systems-joins-open-source-automation-development-lab-osadl-cooperative
http://www.automation.com/automation-news/industry/wibu-systems-joins-open-source-automation-development-lab-osadl-cooperativeOSADL coordinates the development and funding of open source projects on behalf of its members, who enjoy many benefits, including quality assurance, software development, technology support, legal compliance, marketing, training, and above all support in licensing in the form of legal support through the OSADL general counsel, auditing, and certificationThu, 09 Nov 2017 11:38:40 -0600The Push for Industrial Cyber Security Standards- A Look at Underwriters Laboratory’s Effortshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/the-push-for-industrial-cyber-security-standards-a-look-at-underwriters-laboratorys-efforts
http://www.automation.com/automation-news/article/the-push-for-industrial-cyber-security-standards-a-look-at-underwriters-laboratorys-effortsBy Bill Lydon, Editor, Automation.com
While industrial automation suppliers can claim products are cybersecure it is hard to prove. Standards and certification, like electrical and safety device requirements, today for cybersecurity are one such way for companies to illustrate that proof. Tue, 07 Nov 2017 13:09:19 -0600CyberX releases Global ICS & IIoT Risk Reporthttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/cyberx-releases-global-ics-iiot-risk-report
http://www.automation.com/automation-news/industry/cyberx-releases-global-ics-iiot-risk-reportThe data clearly shows that OT networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and environmental safetyTue, 07 Nov 2017 09:36:04 -0600Wind River introduces Helix Security Framework services offeringhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/wind-river-introduces-helix-security-framework-services-offering
http://www.automation.com/products/wind-river-introduces-helix-security-framework-services-offeringThe Helix Security Framework provides a services offering for both discovering and representing the security needs of IoT devices, as well as the entire IoT system comprised of those devices. Mon, 06 Nov 2017 11:00:24 -0600Pas Global announces RSA interoperability certification for PAS Cyber Integrityhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/pas-global-announces-rsa-interoperability-certification-for-pas-cyber-integrity
http://www.automation.com/automation-news/industry/pas-global-announces-rsa-interoperability-certification-for-pas-cyber-integrityRSA has certified PAS Cyber Integrity as interoperable with RSA NetWitness Suite. Industrial process companies that have RSA NetWitness can access security intelligence for both corporate and process control networks (PCNs) via a single application.Mon, 06 Nov 2017 10:37:48 -0600Northrop Grumman announces launch of 2017-2018 CyberCenturion Competitionhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/northrop-grumman-announces-launch-of-2017-2018-cybercenturion-competition
http://www.automation.com/automation-news/industry/northrop-grumman-announces-launch-of-2017-2018-cybercenturion-competitionA record 575 teams, made up of more 2,500 students, including 116 all-female and 45 cadet teams from across the country have registered to participate, marking a more than threefold increase over last year.Fri, 03 Nov 2017 11:07:17 -0500GE releases Digital Industrial Evolution Index researchhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/ge-releases-digital-industrial-evolution-index-research
http://www.automation.com/library/resources/ge-releases-digital-industrial-evolution-index-researchAccording to the study, optimism among industry executives for the potential of the Industrial Internet is striking. Eighty percent believe the IIoT could be transformational to their companies and industries. At the same time, only 8 percent of those executives say digital transformation is ingrained in their businesses, and 10 percent do not have a digital transformation plan in place.Mon, 30 Oct 2017 12:56:55 -0500Wibu-Systems announces CodeMeter Cloud Licensing Platformhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/wibu-systems-announces-codemeter-cloud-licensing-platform
http://www.automation.com/products/wibu-systems-announces-codemeter-cloud-licensing-platformCodeMeter Cloud Lite enables developers to license their Software-as-a-Service (SaaS) applications, standard PC software, or mobile apps via the cloud. The server interfaces directly with CodeMeter License Central, the company’s platform for creating, delivering and managing license entitlements.Mon, 30 Oct 2017 12:12:28 -0500Indegy announces cybersecurity expert Mark Weatherford as newest member of Indegy board of advisorshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/indegy-announces-cybersecurity-expert-mark-weatherford-as-newest-member-of-indegy-board-of-advisors
http://www.automation.com/automation-news/industry/indegy-announces-cybersecurity-expert-mark-weatherford-as-newest-member-of-indegy-board-of-advisorsMark Weatherford is currently Senior Vice President & Chief Cybersecurity Strategist at datacenter security vendor vArmour. He was recently recognized by SC Media with a Reboot Leadership Award as the Top Influencer in the cybersecurity industry. Mon, 23 Oct 2017 11:53:13 -0500Nozomi Networks introduces SCADAguardian v17.5http://www.automation.com/portals/manufacturing-operations-management/cyber-security/nozomi-networks-introduces-scadaguardian-v175
http://www.automation.com/products/nozomi-networks-introduces-scadaguardian-v175With this 17.5 release, Nozomi Networks delivers ICS threat detection coupled with an API that enables OT/IT integration within organizations.Mon, 23 Oct 2017 11:12:03 -0500Tempered Networks announces release of Identity-Defined Networking softwarehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/tempered-networks-announces-release-of-identity-defined-networking-software
http://www.automation.com/products/tempered-networks-announces-release-of-identity-defined-networking-softwareThe release features HIPclient Automation to create secure enclaves for workgroups to connect and protect sensitive data and intellectual property. Also available with this release is the HIP Cloud Connector to connect, segment, peer, and secure DevOps workloads within and across cloud providers.Mon, 23 Oct 2017 10:56:32 -0500AAEON introduces ICS-6270 network security appliancehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/aaeon-introduces-ics-6270-network-security-appliance
http://www.automation.com/products/aaeon-introduces-ics-6270-network-security-applianceDesigned to streamline security management in unmanned and harsh environments, the ICS-6270 provides secure deployment for mission-critical frameworks, supporting both Windows and Linux operating systems, and is built to supplement existing network platforms in industrial environments with minimal configuration.Fri, 20 Oct 2017 11:07:52 -0500Rockwell Automation announces Infrastructure-as-a-Service offeringhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/rockwell-automation-announces-infrastructure-as-a-service-offering
http://www.automation.com/products/rockwell-automation-announces-infrastructure-as-a-service-offeringIaaS is offered with two Rockwell Automation pre-engineered network solutions, including the Industrial Data Center (IDC) and the Industrial Network Distribution Solution (INDS). These solutions are designed for industrial use and incorporate technologies from Rockwell Automation Strategic Alliance partners Cisco, Panduit and Microsoft.Thu, 19 Oct 2017 11:38:10 -0500ISA and Honeywell to host 3 November cybersecurity webinarhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/isa-and-honeywell-to-host-3-november-cybersecurity-webinar
http://www.automation.com/automation-news/industry/isa-and-honeywell-to-host-3-november-cybersecurity-webinarThe webinar, which will be held from 12 p.m. – 1:30 p.m., EST will focus on how to address cybersecurity concerns in gas metering and data management.Tue, 17 Oct 2017 09:44:47 -0500Factory Security: Don’t Be an Unintentional Sharkhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/factory-security-dont-be-an-unintentional-shark
http://www.automation.com/automation-news/article/factory-security-dont-be-an-unintentional-sharkBy Eric Ehlers, Cisco
Entering a factory in this day and age is a bit like taking a dive into the ocean. There is a plethora of different ecosystems and constant movement. Both can be mind boggling when you view them for the first time. So how can manufacturers protect their ecosystem?Mon, 16 Oct 2017 13:49:35 -0500Rockwell Automation announces threat detection services for manufacturinghttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/rockwell-automation-announces-threat-detection-services-for-manufacturing
http://www.automation.com/products/rockwell-automation-announces-threat-detection-services-for-manufacturingThe threat detection services take a product-agnostic approach to create a robust asset inventory across both IT and OT systems in an industrial operation.Mon, 16 Oct 2017 13:30:27 -0500Northrop Grumman partners with King Saud University to hold CyberArabia 2017http://www.automation.com/portals/manufacturing-operations-management/cyber-security/northrop-grumman-partners-with-king-saud-university-to-hold-cyberarabia-2017
http://www.automation.com/automation-news/industry/northrop-grumman-partners-with-king-saud-university-to-hold-cyberarabia-2017The third annual cyber security workshop and competition, CyberArabia, to be held Oct. 11-12, 2017, is part of the company’s global commitment to cyber education and workforce development, and will include a cyber defense competition that recognizes winners on both the men’s and women’s campuses across Saudi universities.Fri, 13 Oct 2017 11:46:12 -0500ATEK announces AssetScan suite of condition monitoring solutionshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/atek-announces-assetscan-suite-of-condition-monitoring-solutions
http://www.automation.com/products/atek-announces-assetscan-suite-of-condition-monitoring-solutionsThe AssetScan condition monitoring suite includes differential pressure monitors, level monitors and temperature monitoring solutions. The AssetScan condition monitoring suite also includes battery-powered and cellular enabled solutions.Thu, 12 Oct 2017 15:30:36 -0500Securing Your Data While Traveling the Worldhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/securing-your-data-while-traveling-the-world
http://www.automation.com/automation-news/article/securing-your-data-while-traveling-the-worldDespite the amount of communication done long-distance nowadays, travel is an important part of business. With the advent of technology-based business information, security is no longer limited to just your own safety -- the security of your data is top priority too. Here are some easy tips for data protection.Fri, 06 Oct 2017 11:03:20 -0500Lenze partners with ei3 to offer IIoT-based remote analysis and maintenance serviceshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/lenze-partners-with-ei3-to-offer-iiot-based-remote-analysis-and-maintenance-services
http://www.automation.com/automation-news/industry/lenze-partners-with-ei3-to-offer-iiot-based-remote-analysis-and-maintenance-servicesAs part of their service contract with Lenze, machine builders can collect all the data that is available inside the Lenze controllers. They can then evaluate this data and make it available to their own customers, either as an up-to-date dashboard or in the form of reports providing performance figures.Mon, 02 Oct 2017 20:19:44 -0500Claroty partners with Quann to create OT security solution for Singapore information infrastructurehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/claroty-partners-with-quann-to-create-ot-security-solution-for-singapore-information-infrastructure
http://www.automation.com/automation-news/industry/claroty-partners-with-quann-to-create-ot-security-solution-for-singapore-information-infrastructureThe partnership aligns with the Singapore Government’s vision to create a secure Smart Nation by securing control systems, which form the backbone of most of the CII, such as communications, power, water and transport in Singapore. Wed, 20 Sep 2017 10:42:35 -0500Siemens and PAS Global announces partnership to enhance ICS cybersecurityhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/siemens-and-pas-global-announces-partnership-to-enhance-ics-cybersecurity
http://www.automation.com/automation-news/industry/siemens-and-pas-global-announces-partnership-to-enhance-ics-cybersecuritySiemens, a global engineering and technology company, and PAS Global, a provider of industrial control system (ICS) cybersecurity solutions, announced an agreement to provide fleet-wide, real time monitoring for control systems.Tue, 19 Sep 2017 11:29:59 -0500ISA and exida announce ISASecure EDSA Level 1 cybersecurity certification for Yokogawa ProSafe-RS R4.01.00 http://www.automation.com/portals/manufacturing-operations-management/cyber-security/isa-and-exida-announce-isasecure-edsa-level-1-cybersecurity-certification-for-yokogawa-prosafe-rs-r40100
http://www.automation.com/automation-news/industry/isa-and-exida-announce-isasecure-edsa-level-1-cybersecurity-certification-for-yokogawa-prosafe-rs-r40100The Yokogawa ProSafe-RS Safety Control System is Yokogawa’s second product to be certified to the ISASecure Conformance Scheme. Yokogawa also has a DCS Controller product certified to ISASecure EDSA.Thu, 07 Sep 2017 11:48:57 -0500ISA and Siemens partner to advance industrial cybersecurity awarenesshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/isa-and-siemens-partner-to-advance-industrial-cybersecurity-awareness
http://www.automation.com/automation-news/industry/isa-and-siemens-partner-to-advance-industrial-cybersecurity-awarenessThe partnership, forged in response to the changing industrial security landscape and growing cyber-threats to automation networks and systems, specifically focuses on broadening understanding and adoption of industrial automation security standards. Wed, 30 Aug 2017 10:44:58 -0500Deloitte partners with Unified Technologies to enhance Caribbean cybersecurity solutionshttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/deloitte-partners-with-unified-technologies-to-enhance-caribbean-cybersecurity-solutions
http://www.automation.com/automation-news/industry/deloitte-partners-with-unified-technologies-to-enhance-caribbean-cybersecurity-solutionsThis alliance will provide Deloitte with specific tools and platforms to support their Cyber Risk practice, and expand the breadth and depth of their services in the Caribbean and Bermuda region. Mon, 28 Aug 2017 11:11:51 -0500Indegy announces Gaby Koren as Vice President, Americashttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/indegy-announces-gaby-koren-as-vice-president-americas
http://www.automation.com/automation-news/industry/indegy-announces-gaby-koren-as-vice-president-americasPrior to joining Indegy, Gaby was executive vice president at Panaya, an Infosys company, where she was responsible for sales and marketing in the Americas. Thu, 24 Aug 2017 11:33:01 -0500Honeywell's ControlEdge PLC earns ISASecure Level 2 certificationhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/honeywells-controledge-plc-earns-isasecure-level-2-certification
http://www.automation.com/automation-news/industry/honeywells-controledge-plc-earns-isasecure-level-2-certificationControlEdge PLC is the first PLC to be awarded the ISASecure Level 2 certification, which builds on the Level 1 capabilities by providing additional security features such as the confidentiality and integrity of data at rest and in motion, detection of unauthorized changes and additional protection against Denial of Service attacks. Tue, 22 Aug 2017 11:34:51 -0500NUST MISIS and Cognitive Technologies announces VisionHack 2017 hackathonhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/nust-misis-and-cognitive-technologies-announces-visionhack-2017-hackathon
http://www.automation.com/automation-news/industry/nust-misis-and-cognitive-technologies-announces-visionhack-2017-hackathonFrom September 11th- 13th in Moscow, NUST MISIS and Cognitive Technologies will hold the first university hackathon on artificial intelligence and computer vision with an available prize fund of more than $30,000. Tue, 08 Aug 2017 10:12:14 -0500Zebra Technologies Study: 2/3 of global manufacturers to adopt IIoT by 2022http://www.automation.com/portals/manufacturing-operations-management/cyber-security/zebra-technologies-study-23-of-global-manufacturers-to-adopt-iiot-by-2022
http://www.automation.com/automation-news/industry/zebra-technologies-study-23-of-global-manufacturers-to-adopt-iiot-by-2022Driven by globalization, intensifying competition and rising customer demand for more options and higher quality products, a connected plant floor has become a necessity. Zebra’s survey shows the number of organizations achieving a fully connected factory is expected to rise dramatically over the next five years.Mon, 07 Aug 2017 11:55:27 -0500Panduit and Uptake partner to enhance condition monitoring in manufacturinghttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/panduit-and-uptake-partner-to-enhance-condition-monitoring-in-manufacturing
http://www.automation.com/automation-news/industry/panduit-and-uptake-partner-to-enhance-condition-monitoring-in-manufacturingPanduit’s IntraVUE and SynapSense edge data collection capabilities and Uptake’s predictive analytics product suite and advanced data science capabilities will provide a solution delivering actionable manufacturing plant condition monitoring analytics.Mon, 07 Aug 2017 11:34:12 -0500Claroty announces cybersecurity partnership with Schneider Electrichttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/claroty-announces-cybersecurity-partnership-with-schneider-electric
http://www.automation.com/automation-news/industry/claroty-announces-cybersecurity-partnership-with-schneider-electricUnder the terms of the agreement, Claroty will market its real-time OT/ICS network monitoring and detection solution to Schneider Electric's customers through the company's Collaborative Automation Partner Program (CAPP).Mon, 07 Aug 2017 11:29:30 -0500PAS Global releases PlantState Suite (PSS) 8.3 featuring Alarm Mechanichttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/pas-global-releases-plantstate-suite-pss-83-featuring-alarm-mechanic
http://www.automation.com/products/pas-global-releases-plantstate-suite-pss-83-featuring-alarm-mechanicPSS is an integrated abnormal situation management software platform designed to optimize Independent Protection Layers (IPL), such as process control loops, alarms, safety instrumented systems, and pressure relief systems.Fri, 04 Aug 2017 11:43:33 -0500How to Keep Your Manufacturing Process Securehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/how-to-keep-your-manufacturing-process-secure
http://www.automation.com/automation-news/article/how-to-keep-your-manufacturing-process-secureBy Robert Glass, ABB
As food manufacturing plants become more connected through the Industrial Internt of Things (IIoT), the threat of cyber-attacks and how much damage they can do, has increased. This article offers advice on how to ensure your manufacturing process is kept secure.Wed, 02 Aug 2017 11:08:23 -0500SecuredTouch introduces HUMANOBOT security solutionhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/securedtouch-introduces-humanobot-security-solution
http://www.automation.com/products/securedtouch-introduces-humanobot-security-solutionSecuredTouch behavioral biometrics technology was developed to analyze human interaction with their mobile devices, so its HUMANOBOT solution is fine-tuned to continuously discover non-human device activity, automatically detecting fraud.Wed, 02 Aug 2017 11:01:38 -0500Powering Automatic Teller Machines One Board at a TImehttp://www.automation.com/pdf_articles/AAEON/AppStory-IMBM-H61A.PDF
http://www.automation.com/pdf_articles/AAEON/AppStory-IMBM-H61A.PDFBy AAEON
In 2014, China overtook the USA and became the world’s largest ATM market, according to Retail Banking Research (RBR), a financial strategy and data consultancy headquartered in London. Tue, 01 Aug 2017 11:15:58 -0500Honeywell completes acquisition of NextNinehttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/honeywell-completes-acquisition-of-nextnine
http://www.automation.com/automation-news/industry/honeywell-completes-acquisition-of-nextnineThe business will be integrated into Honeywell’s Industrial Cyber Security group and will strengthen Honeywell’s capability to offer multi-vendor, multi-site secure remote access, monitoring and support to protect industrial control systems and critical infrastructure against a growing threat of cyber attacks.Tue, 01 Aug 2017 10:47:21 -0500Beyond Security announces winners of Hack2Win 2017 http://www.automation.com/portals/manufacturing-operations-management/cyber-security/beyond-security-announces-winners-of-hack2win-2017
http://www.automation.com/automation-news/industry/beyond-security-announces-winners-of-hack2win-2017Beyond Security offered a challenge to hack the D-link router (AC1200 / DIR-850L), with successful attempts to win prizes of up to $5000.Mon, 31 Jul 2017 10:50:38 -0500Veracity announces completion of first phase of Chess Master ICS cybersecurity projecthttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/veracity-announces-completion-of-first-phase-of-chess-master-ics-cybersecurity-project
http://www.automation.com/automation-news/industry/veracity-announces-completion-of-first-phase-of-chess-master-ics-cybersecurity-projectThe Chess Master project was designed to research, develop, test, and commercialize a security validation and policy enforcement application that connects into a flow controller that manages all field networks centrally. Mon, 31 Jul 2017 10:43:20 -0500Industrial Cybersecurity for Small- and Medium-Sized Businesses: A Practical Guidehttp://www.automation.com/pdf_articles/isa/Industrial_Cybersecurity_for_SMB_WP.pdf
http://www.automation.com/pdf_articles/isa/Industrial_Cybersecurity_for_SMB_WP.pdf Effective cybersecurity management is essential for all organizations, regardless of size. This ISA document is intended to provide a starting point for small- and medium-businesses (SMBs), particularly those that manage industrial processes and employ some level of automation.
Fri, 28 Jul 2017 10:45:46 -0500CyberX announces ICS Attack Vector Prediction technologyhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/cyberx-announces-ics-attack-vector-prediction-technology
http://www.automation.com/automation-news/industry/cyberx-announces-ics-attack-vector-prediction-technologyCyberX’s ICS Attack Vector Prediction technology generates a visual representation of all possible attack chains — ranked by risk — that can compromise critical OT assets, such as robotics machinery in manufacturing plants and circuit breakers in electrical substationsWed, 26 Jul 2017 11:54:40 -0500ISA publishes 'Industrial Cybersecurity for Small and Medium Sized Businesses' whitepaper http://www.automation.com/portals/manufacturing-operations-management/cyber-security/isa-publishes-industrial-cybersecurity-for-small-and-medium-sized-businesses-whitepaper
http://www.automation.com/automation-news/industry/isa-publishes-industrial-cybersecurity-for-small-and-medium-sized-businesses-whitepaperThis white paper is designed to help small- and medium-sized businesses (SMBs) recognize their vulnerability to industrial cyberattack and forge an effective cybersecurity plan based on established standards and practices.Wed, 26 Jul 2017 10:23:27 -0500Cisco 2017 Midyear Cybersecurity Reporthttp://www.automation.com/pdf_articles/cisco/Cisco_2017_MCR_Embargoed_til_072017_5_AM_PT_8_AM_ET.pdf
http://www.automation.com/pdf_articles/cisco/Cisco_2017_MCR_Embargoed_til_072017_5_AM_PT_8_AM_ET.pdfIn these reports, Cisco intends to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.Wed, 19 Jul 2017 12:48:34 -0500The Growing Threat of Ransomware on the Shop Floorhttp://www.automation.com/portals/manufacturing-operations-management/cyber-security/the-growing-threat-of-ransomware-on-the-shop-floor
http://www.automation.com/automation-news/article/the-growing-threat-of-ransomware-on-the-shop-floorBy Galina Antova, Claroty
We cannot afford to rely on the same (sub)standard we used in IT security over the past 10 years. We have to act ahead of the threat – we have to do something now.Tue, 18 Jul 2017 10:13:12 -0500